A cross-session information disclosure vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877fab52acacf7ab8251 (2026-01-19). The affected Streamlit-based GitHub MCP Agent stores user-supplied API tokens in process-wide environment variables using os.environ without proper session isolation. Because Streamlit serves multiple concurrent users from a single Python process, credentials provided by one user remain accessible to subsequent unauthenticated users. An attacker can exploit this issue to retrieve sensitive information such as GitHub Personal Access Tokens or LLM API keys, potentially leading to unauthorized access to private resources and financial abuse.
Metrics
Affected Vendors & Products
References
History
Tue, 07 Apr 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Cross‑Session Information Disclosure of API Tokens in Awesome‑LLM‑Apps |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Theunwindai
Theunwindai awesome Llm Apps |
|
| CPEs | cpe:2.3:a:theunwindai:awesome_llm_apps:2026-01-19:*:*:*:*:*:*:* | |
| Vendors & Products |
Theunwindai
Theunwindai awesome Llm Apps |
Fri, 03 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Shubhamsaboo
Shubhamsaboo awesome-llm-apps |
|
| Vendors & Products |
Shubhamsaboo
Shubhamsaboo awesome-llm-apps |
Tue, 31 Mar 2026 03:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Cross‑Session Information Disclosure of API Tokens in Awesome‑LLM‑Apps |
Mon, 30 Mar 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 CWE-284 CWE-522 |
|
| Metrics |
cvssV3_1
|
Mon, 30 Mar 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A cross-session information disclosure vulnerability exists in the awesome-llm-apps project in commit e46690f99c3f08be80a9877fab52acacf7ab8251 (2026-01-19). The affected Streamlit-based GitHub MCP Agent stores user-supplied API tokens in process-wide environment variables using os.environ without proper session isolation. Because Streamlit serves multiple concurrent users from a single Python process, credentials provided by one user remain accessible to subsequent unauthenticated users. An attacker can exploit this issue to retrieve sensitive information such as GitHub Personal Access Tokens or LLM API keys, potentially leading to unauthorized access to private resources and financial abuse. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-03-30T00:00:00.000Z
Updated: 2026-03-30T18:15:13.246Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-29872
Updated: 2026-03-30T18:12:21.520Z
Status : Analyzed
Published: 2026-03-30T18:16:18.523
Modified: 2026-04-06T16:00:39.033
Link: CVE-2026-29872
No data.